Back to Security Insights

Data Breaches and Encryption

What actually happens in a data breach, and how strong encryption changes impact, notification, and recovery.

Inkrypt · Security Insights

What “data breach” means in practice

A data breach is not a single event type. It’s any situation where unauthorised parties gain access to data:

  • Misconfigured storage exposed to the internet.
  • Compromised application servers.
  • Stolen backups or endpoint devices.
  • Malicious insiders exfiltrating information.

Without encryption, a breach is straightforward:

  • Attackers get plaintext or easily reversible hashes.
  • You assume that all exposed data is compromised.
  • You notify, remediate, and accept that content is effectively public.

Encryption changes that story only if it is implemented correctly.

How strong encryption limits breach impact

With strong, correctly implemented encryption:

  • Attackers who steal data get ciphertext instead of plaintext.
  • To turn that ciphertext into something useful, they would need:
  • The decryption key, or
  • A practical break in the algorithm or implementation.

In systems like Inkrypt:

  • Notes are encrypted client-side via the Web Crypto API.
  • Keys are derived from passwords using PBKDF2 with 310k iterations.
  • Content is encrypted with AES-256-GCM with random IVs.
  • Servers store only ciphertext, salt, IV, and minimal metadata.

If an attacker steals our database:

  • They do not get passwords or keys.
  • They see random-looking bytes plus non-sensitive parameters.
  • Without your password, the ciphertext remains useless.

That’s what “encryption limiting breach impact” means in concrete terms.

Breach scenarios: with and without encryption

Consider two versions of the same system:

  • Without strong encryption:
  • Database dumps contain plaintext notes.
  • Logs may contain sensitive content.
  • Backups replicate all of this indefinitely.
  • With zero-knowledge client-side encryption:
  • Database and backups contain only ciphertext, salt, IV, metadata.
  • Logs never see decrypted content.
  • The provider cannot decrypt even under pressure.

In the second scenario:

  • Regulatory risk is lower because there is a strong argument that no readable personal data was exposed.
  • Attackers must move on to attacking endpoints or passwords instead of trivially reading dumped tables.

Encryption does not prevent breaches, but it can turn a catastrophic incident into a contained one.

How encryption interacts with incident response

When responding to a breach, you care about:

  • What was accessed (systems, tables, buckets).
  • What was exposed (plaintext vs ciphertext).
  • What can realistically be done with it.

Strong encryption changes your options:

  • If only ciphertext protected by AES-256-GCM and strong keys was exposed:
  • You may not need to rotate as many credentials.
  • You may avoid notifying users that their content is readable.
  • You can focus on hardening and root-cause fixes.
  • If plaintext or keys were exposed:
  • You must assume data is compromised.
  • You rotate keys and passwords.
  • You handle notifications and regulatory reporting.

Zero-knowledge designs like Inkrypt simplify this analysis: we know that compromising our backend alone never reveals plaintext notes.

For more on that architecture:

Where encryption does not help in a breach

Encryption is not a universal shield:

  • Compromised endpoints:
  • If malware runs on a user’s laptop or phone, it can see plaintext after decryption.
  • Stolen passwords:
  • Phishing or keylogging can give attackers valid credentials.
  • Misuse by authorised users:
  • Anyone who legitimately has access can copy or leak content.

This is why a realistic breach-discussion includes:

  • Endpoint security.
  • Identity and access management.
  • Monitoring for anomalous behaviour.

Encryption is necessary, but not sufficient, especially when endpoints or people are compromised.

FAQ: Data breaches and encryption

Q1. Does encrypting data mean breaches no longer matter?

No. Breaches still matter for availability, trust, and metadata exposure. But if only properly encrypted ciphertext is exposed, the risk of actual content disclosure is significantly reduced.

Q2. What kind of encryption meaningfully reduces breach impact?

Modern, well-implemented encryption such as AES-256-GCM with strong key management. In password-based systems, keys derived using KDFs like PBKDF2 with high iteration counts (for example, 310k) further raise the cost of brute-force attacks.

Q3. How does a zero-knowledge tool like Inkrypt behave in a breach?

If Inkrypt’s backend were compromised, attackers would get ciphertext, salts, IVs, and metadata, but not your passwords or keys. Decryption happens only in your browser using the Web Crypto API, PBKDF2, and AES-256-GCM.

Q4. Do I still have to notify users if encrypted data is stolen?

Regulators look at whether exposed data is readable. Strong, uncompromised encryption can lower notification obligations, but exact requirements depend on jurisdiction and context. Encryption improves your position; it doesn’t completely remove legal duties.

Q5. What else should I do besides encrypt?

Combine encryption with good access control, endpoint security, monitoring, and an incident-response plan. Encryption works best as part of a layered defense, not as your only control.

Where to go next

To understand how we design for reduced breach impact:

And if you want to reduce the blast radius of your own potential breaches for sensitive notes and secrets, start using Inkrypt at https://www.inkrypt.online for zero-knowledge, client-side encrypted storage.